|Summary:||Uses SNMP to determine if a flaw is present|
A series of failed telnet authentication attempts to the switch can
cause the Catalyst Switch to fail to pass traffic or accept
management connections until the system is rebooted or a power cycle
is performed. All types of telnet authentication are affected,
including Kerberized telnet, and AAA authentication.
This vulnerability is documented as Cisco bug ID CSCds66191.
Risk factor : High
*** As Nessus solely relied on the banner of the remote host
*** this might be a false positive
BugTraq ID: 2072|
Common Vulnerability Exposure (CVE) ID: CVE-2001-0041
Cisco Security Advisory: 20001206 Cisco Catalyst Memory Leak Vulnerability
XForce ISS Database: cisco-catalyst-telnet-dos
|Copyright||This script is (C) 2002 Renaud Deraison|
|This is only one of 32582 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.